CHAPTER 5
Enhanced Security Monitoring and Compliance with AWS Services
In this chapter, you will learn about
• Monitoring resource configuration using AWS Config
• Threat detection using Amazon GuardDuty
• Discovering, classifying, and protecting sensitive data with Amazon Macie
• AWS Security Hub
• Amazon Trusted Advisor
Many independent studies (see the “Additional Resources” section for details) have found that a majority of future cloud breaches will be due to resource misconfiguration, mismanaged credentials, or insider theft and not necessarily cloud provider vulnerabilities. The cloud has become the new normal, which makes many organizations store more sensitive data in it as they increasingly run critical business applications ...
Get AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.